Tuesday, August 27, 2019

BlueKeep Virus Continues To Be An Issue For Microsoft

Wormable bugs are an ongoing concern for Microsoft.  Recently, the company released a set of patches for two newly discovered 'BlueKeep-Like vulnerabilities" that impact a wide range of Windows Operating Systems.

These bugs plague the company's remote desktop services and permit malware to spread rapidly from one device to another.

Remote Desktop Services is an older technology that's been an integral part of the Microsoft Windows environment for decades.  It's a good idea and a widely used technology that allows Windows users to remotely access another computer over a network.  Unfortunately, flaws in the system allow malicious third parties to gain control over the system and spread malware via remote code execution.

The two most recently discovered bugs are being tracked as CVE-2019-1181 and CVE-2019-1182.  They were discovered by Microsoft during one of the company's routine security checks. Patches were released for both as part of the company's August Patch Tuesday.

As the company explained in a recent blog post related to the issues:

"These two vulnerabilities are also 'wormable,' meaning that any future malware that exploits these could propagate from vulnerable computer to vulnerable computer without user interaction."

The operating systems vulnerable to the newly discovered bugs are:
  • Windows 7, Service Pack 1
  • Windows Server 2008 R2, Service Pack 1
  • Windows Server 2012
  • Windows 8.1
  • Windows Server 2012 R2
  • Windows 10, including server versions
At present, Microsoft has no statistics about how many machines in the Windows ecosystem are vulnerable to the two new bugs. The company has detected no third-party manipulations of the vulnerabilities to this point, but they recommend immediately applying the relevant patches in order to mitigate risk.

Unfortunately, recent reports have revealed that many businesses have been slow to respond to the threat that BlueKeep vulnerabilities represent.  If your company is among them, the time to act is now.

Call SpartanTec, Inc. if you want to make sure that your operating systems are secured from the most common online threats today. Let our team help you in keeping your network and business safe and secure from various types of risks and vulnerabilities.

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Monday, August 19, 2019

Update Your iPhone To Avoid Latest iMessage Security Vulnerability

If you own an iPhone, be aware that a new iMessage vulnerability has been recently found and patched by Apple. This was part of the iOS 12.4 update.

The flaw allowed hackers to access and read the contents of files stored on iOS devices remotely. They could access files the same way as the device owner with no sandbox, and with no user interaction needed.

The issue was discovered by Natalie Silvanovich, who is a security research with Google's Project Zero.  As a proof of concept, she created a demo that only works on devices running iOS 12 or later. She describes it as "a simple example to demonstrate the reach-ability of the class in Springboard. The actual consequences of the bug are likely more serious."

In describing the issue itself, Silvanovich had this to say:

"First, it could potentially allow undesired access to local files if the code deserializing the buffer ever shares it (this is more likely to cause problems in components that use serialized objects to communicate locally than in iMessage).  Second, it allows an NSData object to be created with a length that is different than the length of its byte array.  This violates a very basic property that should always be true of NSData objects.  This can allow out of bounds reads, and could also potentially lead to out-of-bounds writes, as it is now possible to create NSData objects with very large sizes that would not be possible if the buffer was backed."

As mentioned, this bug has already been patched, along with two other iMessage vulnerabilities that Silvanovich recently discovered. All of them were addressed in Apple's most recent (12.4) update. If you're not in the habit of installing security updates automatically, then you'll need to grab this one and install it manually at your earliest convenience.

Smart gadgets and devices are everywhere. Regardless of the brand, a prudent owner will find ways to make sure that all their smartphones, computers, laptops, and network in general is safe against potential vulnerabilities that could put their pertinent information at risk. Call SpartanTec, Inc. in Wilmington NC to make sure that efficient security measures are in place to protect your personal information, business, and clients from the many different online threats today. 


SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Thursday, August 15, 2019

Security Issue Found In Multiple Devices Is Called ‘Urgent 11’

Let's take a little time to talk about the vast numbers of smart devices in use around the world. You probably have several in your home or office. Smart devices need operating systems, just like your phone and your PC. Of course, mobile device operating systems must be much smaller and more compact. After all, they don't really need to do a lot of computing, and they don't need a GUI, so the code tends to be on the lean side.

The odds are excellent that you've never even heard of most of the IoT's operating systems, nor the companies that make them. Take VxWorks by a company called Wind River, for example.  It's the most popular Real Time Operating System (RTOS), used in a wide range of smart devices today.  They don't get a lot of attention or oversight because almost nobody has heard of them.

That's beginning to change, however.  Recently, security researchers disclosed the details of the "Urgent 11", which are 11 vulnerabilities found in VxWorks that can be used by hackers to take control of a variety of devices. These devices range from medical systems to printers, industrial equipment, routers, and more.

The company has been in existence for 32 years. Yet, in that time, only 13 security flaws with a MITRE-assigned CVE have been found in the VxWorks RTOS, because again, nobody's paying attention.

The good news is that when someone finally started paying attention, Wind River responded quickly and resolved all eleven of the security flaws, issuing a patch to correct them.  There's just one rather significant catch, however.

The company is claiming that the vulnerabilities are not unique to Wind River software and that the IPnet stack (where the vulnerabilities were found) was acquired by the company back in 2006.  Prior to Wind River's acquisition of it, it was deployed in a wide range of other RTOS'.

All that to say, while Wind River is acting responsibly, there are an unknown number of other RTOS' out there that are vulnerable. The companies behind them may be doing little or nothing about it.  In many ways, the OS ecosystem of the IoT is still very much a black box, and that's troublesome.

As a company, are you doing your part in securing your smart devices and your network? Or are you left in the dark about their vulnerabilities? Let SpartanTec, Inc. Wilmington help you find out if your business is at risk. Call now and learn more about their complimentary, one-time scan with Dark Web ID™ Credential Monitoring.

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255

Monday, August 12, 2019

Facebook Is Making Changes To Privacy Following Huge Fine


We're talking about the result of a massive five billion dollar fine over violations surrounding the Cambridge Analytica scandal. While the staggering size of the fine made all the headlines, there's more to the company's agreement than just several billion dollars.

In addition to the fine itself, the company has also accepted an agreement.

It forces Facebook to implement a new privacy framework, and to be monitored and held accountable for decisions it makes about its users' privacy and information it collects on them.

The FTC Press release reads, in part, as follows:

"The order requires Facebook to restructure its approach to privacy from the corporate board-level down and establishes strong new mechanisms to ensure that Facebook executives are accountable for the decisions they make about privacy and that those decisions are subject to meaningful oversight (for a period of not less than twenty years)."

Facebook also published a statement about their acceptance of the fine, but it offered little in the way of new information.  Digging a bit deeper, however, some of the details of the changes coming to Facebook include the following:
  • The formation of an independent privacy committee - The committee will be appointed by an independent nominating committee and be comprised of Facebook's board of directors. The FTC says this will help limit CEO Mark Zuckerberg's formerly unfettered control over decisions affecting user privacy.
  • The appointment of Compliance Officers - These people will report to the new privacy committee and will be tasked with monitoring the entire company's privacy program. The Compliance offers are not appointed by Facebook's CEO or any Facebook employee, and no Facebook employee (including the CEO) can remove those officers.  One of the responsibilities of the new Compliance Team will be to submit reports to the FTC.
  • More and better external oversight of Facebook - The FTC's ruling strengthens the role of independent third-party assessors who will conduct independent reviews of Facebook's privacy program at two-year intervals.
Will these steps be enough?  Only time will tell, but it's certainly a great start.  Kudos to the FTC for holding Facebook accountable and trying to be a force for change.

Businesses of all sizes are being held responsible for the safe keeping of their customers data. SpartanTec, Inc. in Wilmington NC is here to help your business implement a privacy policy for your business, install firewalls to protect your data and train your employees on safe practices. Call us today for an in-depth consultation.

SpartanTec, Inc.
Wilmington, NC 28412
(910) 218-9255
https://spartantecwilmington.business.site